IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Ransomware Protection

Strategies and technologies designed to prevent ransomware attacks, including software solutions and best practices for data protection.

You will find this term commonly used in Security, Cybersecurity

Ransomware-as-a-Service (RaaS)

A model of cybercrime where ransomware creators sell or lease out their ransomware to other criminals, who then carry out attacks.

You will find this term commonly used in Security, Cybersecurity

Rapid Application Development (RAD)

A software development methodology that emphasizes quick prototype releases and iterations.

You will find this term commonly used in Software Development, Methodologies

Rate Encoding

A method in digital communication that adjusts the rate at which data is sent over a communication channel.

You will find this term commonly used in Networking, Data Communication

Rate Limiting

The practice of controlling the rate of requests sent or received by a network interface controller to prevent overload.

You will find this term commonly used in Networking, Security

Rate Limiting API

A technique used to control the amount of incoming or outgoing API requests to or from a system within a given timeframe.

You will find this term commonly used in Software Development, API Management

Rate-Limiting

The process of controlling the amount of incoming or outgoing traffic to or from a network or an application, often used to prevent spam or to manage the load on a network.

You will find this term commonly used in Networking, Security

Raw Data

Data collected from a source, which has not yet been processed or analyzed.

You will find this term commonly used in Data Analysis, Data Processing

RDBMS (Relational Database Management System)

A database management system based on the relational model introduced by E.F. Codd. Examples include Oracle, MySQL, Microsoft SQL Server, and PostgreSQL.

You will find this term commonly used in General IT, Database

React (also React.js or ReactJS)

A JavaScript library for building user interfaces, primarily for web applications.

You will find this term commonly used in Software Development, Web Development

React Hooks

Functions that let developers "hook into" React state and lifecycle features from function components.

You will find this term commonly used in Software Development, Web Development

React Native

An open-source mobile application framework created by Facebook to develop applications for Android, iOS, Web, and UWP by enabling developers to use React along with native platform capabilities.

You will find this term commonly used in Software Development, Mobile Development

Reactive Extensions (Rx)

A library for composing asynchronous and event-based programs using observable sequences and LINQ-style query operators.

You will find this term commonly used in Software Development, Programming

Reactive Programming

A declarative programming paradigm concerned with data streams and the propagation of change.

You will find this term commonly used in Software Development

Reactive Systems

Systems that are responsive, resilient, elastic, and message-driven, designed to cope with failure and high load.

You will find this term commonly used in Software Development, System Architecture

Read Committed

A level of SQL transaction isolation that guarantees that any data read is committed at the moment it is read.

You will find this term commonly used in Database, SQL

Read-Eval-Print Loop (REPL)

An interactive programming environment that takes single user inputs (expressions), evaluates them, and returns the result to the user.

You will find this term commonly used in Software Development, Tools

Read-Only Memory (ROM)

A type of non-volatile storage medium that is used in computers and other electronic devices. Data stored in ROM cannot be electronically modified after the manufacture of the memory device.

You will find this term commonly used in Hardware, General IT

Read-Through Cache

A caching pattern where reads from the cache that result in a cache miss will automatically pull the missing data from the source, cache it, and return it.

You will find this term commonly used in Software Development, Performance Optimization

Real User Monitoring (RUM)

A type of performance analysis that captures and analyzes each transaction by users of a website or application.

You will find this term commonly used in Web Development, Performance Analysis

Real-time Analytics

Real-time analytics involves the analysis of data as it is generated or received, enabling immediate insights and decision-making based on the most current information available.

You will find this term commonly used in Data Analytics, Real-time Processing

Real-Time Clock (RTC)

An electronic device (often an integrated circuit) that measures the passage of time. It is used in various devices for maintaining accurate time.

You will find this term commonly used in Hardware, Embedded Systems

Real-time Collaboration

Real-time collaboration involves multiple users working together on a project or task simultaneously, sharing and editing documents, data, or information in real-time, regardless of their geographical locations.

You will find this term commonly used in Collaboration, Communication, Remote Work

Real-Time Communication

Systems that provide real-time information transfer between devices.

You will find this term commonly used in Networking, Communication

Real-time Data Processing

The processing of data immediately after it is captured or recognized, allowing decisions to be made promptly based on the latest information.

You will find this term commonly used in Data Analysis, Information Processing

Real-Time Operating System (RTOS)

An operating system intended to serve real-time applications that process data as it comes in, typically without buffer delays.

You will find this term commonly used in Software Development, Embedded Systems

Real-Time Processing

The processing of data immediately after capture, often necessary in time-sensitive operations such as navigation or live data broadcasting.

You will find this term commonly used in Data Analysis, General IT

ReCAPTCHA

A system designed to establish that a computer user is human (not a bot) by requiring the user to complete a test that a computer is unable to solve.

You will find this term commonly used in Web Development, Security

ReCAPTCHA v3

The latest version of reCAPTCHA by Google, aiming to improve user experience by eliminating the need for challenges.

You will find this term commonly used in Web Development, Security

Reconciliation

The process of ensuring that two sets of records (usually the balances of two accounts) are in agreement. In IT, it's often used in data processing and database management to ensure consistency.

You will find this term commonly used in Database, Data Management

Record Locking

A technique used in database management systems to control access to a database record in a multi-user environment.

You will find this term commonly used in Database, Concurrency Control

Record Management

The practice of identifying, classifying, archiving, preserving, and destroying records.

You will find this term commonly used in Data Management, Compliance

Recovery Model

In SQL Server, a database property that controls transaction log maintenance on a database. Recovery models are primarily designed to control log maintenance.

You will find this term commonly used in Database, Security

Recovery Point Objective (RPO)

The maximum targeted period in which data might be lost from an IT service due to a major incident.

You will find this term commonly used in Security, Business Continuity

Recovery Site

A site that a company uses to recover and restore its technology infrastructure and operations when its primary site becomes unavailable due to disaster or other disruptive events.

You will find this term commonly used in Business Continuity, Disaster Recovery

Recovery Time Objective (RTO)

The targeted duration of time and a service level within which a business process must be restored after a disaster or disruption.

You will find this term commonly used in Security, Business Continuity

Recursion

In computer science, a method where the solution to a problem depends on solutions to smaller instances of the same problem.

You will find this term commonly used in Software Development, Algorithms

Recursive DNS Query

A type of DNS query in which the DNS server will fully resolve the request, handling all the necessary queries to track down the DNS record.

You will find this term commonly used in Networking, Internet

Recursive Function

A function that calls itself directly or indirectly in order to solve a problem.

You will find this term commonly used in Software Development, Algorithms

Red Hat Certified Engineer (RHCE)

An advanced level certification that validates the skills, knowledge, and abilities required to be a senior system administrator responsible for Red Hat Enterprise Linux systems.

You will find this term commonly used in System Administration, Linux

Red Hat Enterprise Linux (RHEL)

An open source, enterprise-level Linux operating system developed by Red Hat.

You will find this term commonly used in General IT, Operating Systems

Red Team

In cybersecurity, a group that plays the role of an adversary to test or evaluate the security of a system.

You will find this term commonly used in Security, Cybersecurity

Red Team Exercises

Simulated cyber attacks against an organization's security posture to test its defenses.

You will find this term commonly used in Security, Cybersecurity

Red-Black Tree

A type of self-balancing binary search tree, used in computer science to implement associative arrays, and multi-dimensional indexes.

You will find this term commonly used in Algorithms, Data Structures

Redaction

The process of editing text for publication or removing sensitive information from a document before publication.

You will find this term commonly used in Security, Data Privacy

Redundancy

The duplication of critical components or functions of a system with the intention of increasing reliability of the system.

You will find this term commonly used in General IT, Networking

Redundant Power Supply

A power supply system designed to ensure that a system continues to operate in the event of one power supply failing.

You will find this term commonly used in Hardware, Reliability

Redux

An open-source JavaScript library for managing application state, commonly used with React for building user interfaces.

You will find this term commonly used in Software Development, Web Development

Redux Toolkit

A toolset for efficient Redux development, providing simplified APIs and utilities to reduce boilerplate code in projects using Redux.

You will find this term commonly used in Software Development, Web Development

Refactoring

The process of restructuring existing computer code without changing its external behavior, intended to improve nonfunctional attributes of the software.

You will find this term commonly used in Software Development, Quality Assurance

What's Your
Career Path?
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass