IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Bit Rate Throttling

The intentional slowing down of Internet speed by an Internet service provider (ISP) or a software application, often used to regulate network traffic and manage bandwidth consumption.

You will find this term commonly used in Networking, Internet Technology

Bit Rot

The gradual degradation of data stored on physical media over time, leading to the potential loss or corruption of data. Bit rot can affect various storage media, including hard drives, optical discs, and magnetic tapes. Preventive strategies include regular data backups and data migration.

You will find this term commonly used in Data Management, Hardware

Bit Stream Access

Refers to the regulatory provision allowing third-party telecommunications service providers to access the digital bit stream of another provider's digital subscriber line (DSL) service, facilitating competition and service variety.

You will find this term commonly used in Networking, Telecommunications

Bit-Interleaved Coded Modulation (BICM)

A modulation and coding technique used in digital communication systems to improve the robustness and efficiency of data transmission over noisy channels.

You will find this term commonly used in Telecommunications, Data Communication

Bit-level Parallelism

The simultaneous processing of multiple bits of data in parallel, typically within a CPU or GPU, to improve performance and computational speed.

You will find this term commonly used in Hardware, Performance Optimization

BitLocker

A full disk encryption feature included with Microsoft Windows versions starting from Vista. It is designed to protect data by providing encryption for entire volumes.

You will find this term commonly used in Security, Data Protection

Bitstream Encryption

The encryption of data at the bitstream level, providing security for digital content as it is transmitted or stored. This method is often used in digital rights management (DRM) to protect copyright materials.

You will find this term commonly used in Cryptography, Digital Media

BitTorrent

A peer-to-peer (P2P) file sharing protocol designed for transferring files over the internet efficiently. It breaks down large files into smaller pieces, which are downloaded from multiple sources, reducing the burden on any single source and speeding up download times.

You will find this term commonly used in Networking, General IT

Bitwise Operation

Operations that directly manipulate bits, the basic units of information in computing and digital communications. These operations include AND, OR, XOR, and NOT.

You will find this term commonly used in Software Development, General IT

Black Box Testing

A method of software testing that examines the functionality of an application without peering into its internal structures or workings. This method of test can be applied to virtually every level of software testing: unit, integration, system, and acceptance.

You will find this term commonly used in Software Development

Black Hat Hacker

An individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are typically involved in malicious activities such as fraud, espionage, or vandalism. They may exploit security vulnerabilities for personal gain or to cause disruption.

You will find this term commonly used in Cybersecurity, Security

Black/Grey Box Testing

A hybrid software testing technique that combines elements of both black box testing (no prior knowledge of the internal workings) and grey box testing (some knowledge of the internal structure), aimed at efficient and comprehensive evaluation.

You will find this term commonly used in Software Development, Testing

Blacklist

A basic form of denying access to certain files, websites, or software applications. In cybersecurity, blacklisting helps protect computing systems and networks from potentially harmful or unauthorized software.

You will find this term commonly used in Cybersecurity, Networking

Blacklist Filtering

A security measure that blocks access to or usage of certain websites, email addresses, software, or IP addresses known to be malicious or undesirable.

You will find this term commonly used in Cybersecurity, Network Security

Blacklist vs. Whitelist

In cybersecurity, a blacklist is a list of entities identified as harmful or not allowed, while a whitelist contains entities that are considered safe. The use of these lists helps control access and protect systems from unauthorized or malicious activity.

You will find this term commonly used in Cybersecurity, Network Security

Blade Chassis

The physical frame and infrastructure that houses multiple blade servers, providing power, cooling, networking, and various interconnects to support them. Blade chassis are designed to optimize server density and consolidate resources, offering an efficient solution for data centers and enterprise computing.

You will find this term commonly used in Hardware, Data Center

Blade Enclosure

A chassis housing multiple blade servers, providing shared resources such as power, cooling, and networking. It enables high-density server deployment and efficient management.

You will find this term commonly used in Hardware, Data Center

Blade Server

A server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. Blade servers are designed to save physical space and consume less power.

You will find this term commonly used in Hardware, Data Center

Blob (Binary Large Object)

A collection of binary data stored as a single entity in a database management system. Blobs are typically used to store images, audio files, or other multimedia objects.

You will find this term commonly used in Databases, Data Management

Blob Storage

A service for storing large amounts of unstructured data, such as text or binary data, that can be accessed from anywhere via HTTP or HTTPS. Commonly used in cloud storage services to manage massive amounts of data.

You will find this term commonly used in Cloud Computing, Data Storage

Block Cipher

A method of encrypting text in which a cryptographic key and algorithm are applied to a block of data at once as a single unit, rather than encrypting one bit at a time.

You will find this term commonly used in Cryptography, Security

Blockchain

Blockchain technology is a decentralized and distributed ledger system that records transactions across multiple computers in a way that ensures security, transparency, and immutability. It's the backbone of cryptocurrencies and has applications in various sectors beyond finance.

You will find this term commonly used in Security, Cybersecurity, General IT

Blockchain Analysis

The study and investigation of blockchain transaction data to identify patterns, track cryptocurrency movements, and ensure compliance with regulations. It's crucial for security and financial monitoring.

You will find this term commonly used in Blockchain, Security

Blockchain as a Service (BaaS)

A cloud-based service that enables users to build, host, and use their own blockchain apps, smart contracts, and functions, without the need to maintain and setup the underlying infrastructure themselves.

You will find this term commonly used in Blockchain, Cloud Computing

Blockchain Consensus

The mechanism used in blockchain networks to achieve agreement on the validity of transactions and the current state of the distributed ledger. Common consensus algorithms include Proof of Work (PoW) and Proof of Stake (PoS), ensuring trust and integrity in decentralized systems.

You will find this term commonly used in Blockchain, Security

Blockchain Developer

Specializes in developing and implementing architecture and solutions using blockchain technology.

You will find this term commonly used in Blockchain, Software Development

Blockchain Network

A collective of nodes that together maintain a distributed ledger for a blockchain application. Blockchain networks can be public or private and are used in a variety of applications beyond cryptocurrencies, including supply chain management and secure transactions.

You will find this term commonly used in Blockchain, General IT

Blockchain Platform

A software infrastructure that enables the development, deployment, and management of blockchain systems and applications. Blockchain platforms provide the necessary tools and libraries for creating decentralized applications and smart contracts on a blockchain network.

You will find this term commonly used in Blockchain, Development

Blockchain Smart Contracts

Self-executing contracts with the terms of the agreement directly written into lines of code. They automatically enforce and verify the terms of a contract on a blockchain network.

You will find this term commonly used in Blockchain, Legal Tech

Blockchain-as-a-Service (BaaS)

A cloud-based service that enables users to build, host, and use their own blockchain apps, contracts, and functions on the blockchain while the cloud service provider manages all the necessary tasks and activities to keep the infrastructure agile and operational.

You will find this term commonly used in Cloud Computing, Blockchain

Blogosphere Analysis

The examination and analysis of the blogosphere (the collective community of all blogs and bloggers) to gauge public opinion, trends, and influential content within specific topics or industries.

You will find this term commonly used in Data Analysis, Digital Marketing

Blue Screen of Death (BSOD)

A stop error screen displayed on a Windows computer system after a fatal system error or crash. The BSOD indicates a system crash in which the operating system has reached a condition where it can no longer operate safely.

You will find this term commonly used in Hardware, Software Development

Bluejacking

The practice of sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, tablets, or laptop computers. Bluejacking is typically used for marketing or social purposes and is not harmful; however, it can be exploited for malicious attacks in some cases.

You will find this term commonly used in Networking, Security

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, creating personal area networks. It's widely used in connecting peripherals, such as headsets, keyboards, and speakers, to computers and smartphones.

You will find this term commonly used in Networking, General IT

Bluetooth 5.0

The latest version of the Bluetooth wireless technology, designed to improve speed, range, and bandwidth over previous versions. Bluetooth 5.0 enables more robust wireless connections for devices, supporting the IoT ecosystem with improved data transmission capabilities.

You will find this term commonly used in Networking, IoT

Bluetooth Beacon Technology

Small devices that transmit Bluetooth signals to nearby smart devices, enabling location-based services and information sharing. They are used in retail, navigation, and asset tracking applications.

You will find this term commonly used in Wireless Communication, IoT

Bluetooth Low Energy (BLE)

A power-conserving variant of Bluetooth personal area network (PAN) technology, designed for use in applications that do not require constant data streaming. BLE is used in IoT devices, healthcare, fitness, beacons, and security applications.

You will find this term commonly used in Networking, IoT

Bluetooth Profiles

Specifications that define the minimum requirements that Bluetooth-enabled devices must support to communicate with each other for specific types of applications or use cases.

You will find this term commonly used in Networking, Wireless Communication

Bluetooth SIG (Special Interest Group)

An organization that oversees the development of Bluetooth standards and the licensing of Bluetooth technologies and trademarks to manufacturers.

You will find this term commonly used in Networking, Standards Organizations

Body Area Network (BAN)

A network of wearable computing devices. This technology is often used in health monitoring systems, where sensors collect data on various body parameters for medical analysis.

You will find this term commonly used in Networking, Health IT

Boolean Logic

A subset of algebra used for creating true/false statements. Boolean logic is fundamental to digital circuits and computer programming, as it underpins the operations of binary systems.

You will find this term commonly used in Software Development, General IT

Boot Integrity Services

A set of security measures and technologies designed to ensure that a device's boot process is secure from unauthorized modifications, protecting the system from boot-time malware and ensuring the integrity of the operating system.

You will find this term commonly used in Cybersecurity, Hardware

Boot Sector Virus

A type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks (part of a hard disk that contains machine code to be loaded into RAM by a computer system's built-in firmware).

You will find this term commonly used in Cybersecurity, Hardware

Boot Volume

The disk volume or partition that contains the operating system and its support files. The boot volume is accessed by the computer's firmware or bootloader during the startup process to load the operating system into memory.

You will find this term commonly used in Hardware, Software Development

Bootloader

A small program that manages a dual boot, helping a computer to start up the operating system. It loads the operating system kernel into memory, initiating the boot process. Bootloaders are essential for ensuring the correct and secure start-up of the system.

You will find this term commonly used in Hardware, General IT

Bootstrap Loader

A small program that initiates the loading of the operating system or other larger programs. It resides in the computer's read-only memory (ROM) or firmware.

You will find this term commonly used in Operating Systems, Software Development

Bootstrapping (Computing)

The process of starting up a computer from a halted or powered-down condition, often involving loading the initial software, or bootloader, which then initializes the operating system.

You will find this term commonly used in Software Development, Operating Systems

Border Gateway Protocol (BGP)

An Internet protocol that enables the exchange of routing information between autonomous systems (AS) on the Internet. It's crucial for determining the best paths for data transmission.

You will find this term commonly used in Networking, Internet Technology

Bot

A software application that automates repetitive tasks on the internet. Bots can range from performing simple tasks, like indexing web content for search engines, to more complex activities, such as automating interactions in chat applications or managing social media accounts.

You will find this term commonly used in Software Development, Cybersecurity

Bot Detection

The technology and processes used to identify and mitigate automated software agents (bots) that perform tasks on websites or networks, often for malicious purposes. Bot detection is crucial for preventing fraud, spam, and denial-of-service attacks on web services.

You will find this term commonly used in Cybersecurity, Web Development

What's Your
Career Path?
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass