IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Retina Display

A brand name used by Apple for its series of IPS LCD and OLED displays that have a higher pixel density than traditional Apple displays.

You will find this term commonly used in Hardware, Consumer Electronics

Retrofitting

The process of adding new technology or features to older systems.

You will find this term commonly used in General IT, Upgrades

Return on Investment (ROI)

A measure used to evaluate the efficiency or profitability of an investment, comparing the magnitude and timing of gains from an investment to its cost.

You will find this term commonly used in General IT, Business

Return on Investment (ROI) Analysis

A calculation used to assess the efficiency of an investment or to compare the efficiencies of several different investments.

You will find this term commonly used in Business, Financial Analysis

Reverse Engineering

The process of extracting knowledge or design information from anything man-made and reproducing it or reproducing anything based on the extracted information.

You will find this term commonly used in Security, Software Development

Reverse Engineering Software

The process of deconstructing software's binaries to understand its composition, functionality, and operation. This can be done for various purposes, including security analysis, debugging, and compatibility development.

You will find this term commonly used in Software Development, Security

Reverse Lookup

The process of querying a DNS to determine the domain name associated with an IP address.

You will find this term commonly used in Networking, Internet

Reverse Proxy

A type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client as if they originated from the proxy server itself.

You will find this term commonly used in Networking, Security

Revision Control

The management of changes to documents, computer programs, large web sites, and other collections of information.

You will find this term commonly used in Software Development, Version Control

Revision Control System (RCS)

A software tool that allows multiple users to work on a set of files, recording changes to those files and allowing for the reversion to previous versions.

You will find this term commonly used in Software Development, Version Control

RFI (Request for Information)

A standard business process whose purpose is to collect written information about the capabilities of various suppliers.

You will find this term commonly used in Business, Procurement

RFID (Radio-Frequency Identification)

Uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information.

You will find this term commonly used in General IT, Hardware

RFID Tag

A small object, such as an adhesive sticker, that can be attached to or incorporated into a product for the purpose of identification using radio waves.

You will find this term commonly used in Hardware, Security

RFP (Request for Proposal)

A document that solicits proposal, often made through a bidding process, by an agency or company interested in procurement of a commodity, service, or valuable asset.

You will find this term commonly used in Business, Procurement

RGB (Red, Green, Blue)

A color model in which red, green, and blue light are added together in various ways to reproduce a broad array of colors.

You will find this term commonly used in Hardware, Design

RGB Color Model

A color model in which red, green, and blue light are added together in various ways to reproduce a broad array of colors seen on digital displays.

You will find this term commonly used in Design, Hardware

Right to Repair

A movement advocating for legislation that would allow consumers the ability to repair and modify their own electronic devices.

You will find this term commonly used in General IT, Legal

Ring Topology

A network configuration where each node is connected to two other nodes, forming a single continuous pathway for signals through each node - a ring.

You will find this term commonly used in Networking, Computer Networks

RISC (Reduced Instruction Set Computer)

A computer's microprocessor architecture that allows fewer cycles per instruction (CPI) than a complex instruction set computer (CISC).

You will find this term commonly used in Hardware, Computer Architecture

RISC (Reduced Instruction Set Computing)

A computer architecture design philosophy that emphasizes a smaller set of simple and efficient instructions, often resulting in faster performance.

You will find this term commonly used in Hardware

RISC-V

An open standard instruction set architecture (ISA) based on established reduced instruction set computing (RISC) principles.

You will find this term commonly used in Hardware, Computer Architecture

Risk Analysis

The process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects.

You will find this term commonly used in Security, Business Continuity

Risk Assessment

Risk assessment is the process of evaluating potential risks and their impacts on an organization's operations, assets, or projects, typically followed by the identification and implementation of risk mitigation strategies.

You will find this term commonly used in General IT, Risk Management, Security

Risk Management

Risk management is the process of identifying, assessing, and prioritizing risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and impact of unforeseen events.

You will find this term commonly used in General IT, Business Operations, Security

Risk Mitigation

Strategies and techniques used to manage and minimize risks to an acceptable level.

You will find this term commonly used in Security, Risk Management

Robot Framework

An open-source automation framework for acceptance testing, acceptance test-driven development (ATDD), and robotic process automation (RPA).

You will find this term commonly used in Software Development, Testing

Robotic Automation

Robotic automation is the use of robots or robotic systems to automate tasks, processes, or workflows in various industries and applications, reducing manual labor, improving efficiency, and enhancing productivity and safety in operations.

You will find this term commonly used in Robotics, Automation, Manufacturing

Robotic Process Automation

Robotic process automation (RPA) is the use of software robots or artificial intelligence to automate repetitive tasks and business processes, improving efficiency, accuracy, and scalability while reducing human intervention.

You will find this term commonly used in AI, Automation, Business Processes

Robotic Process Automation (RPA)

The technology that allows anyone today to configure computer software, or a âœrobotâ to emulate and integrate the actions of a human interacting within digital systems to execute a business process.

You will find this term commonly used in AI, Business Automation

Robotic Process Automation (RPA) Tools

Software platforms that provide tools for configuring task automation scripts, which emulate human actions interacting with digital systems to execute business processes.

You will find this term commonly used in AI, Business Automation

Robotics

The interdisciplinary field of engineering and science focused on designing, building, and programming robots to perform tasks autonomously or semi-autonomously.

You will find this term commonly used in General IT, AI

Robustness

The ability of a computer system to cope with errors during execution and to handle erroneous input.

You will find this term commonly used in Software Development, Quality Assurance

Role-Based Access Control (RBAC)

A method of regulating access to computer or network resources based on the roles of individual users within an enterprise.

You will find this term commonly used in Security, Cybersecurity

Root

In computer file systems, the top-most directory in which all other directories and files reside. In networking, the initial authoritative name server. In mathematics and algorithms, the fundamental part from which the rest of the structure derives.

You will find this term commonly used in General IT, Networking, Algorithms

Root Analysis

The process of discovering the root cause of a problem or issue.

You will find this term commonly used in Quality Assurance, Problem Solving

Root Cause Analysis

Root cause analysis (RCA) is a problem-solving technique used to identify the underlying causes of an issue or problem, aiming to prevent its recurrence by addressing the fundamental factors contributing to its occurrence.

You will find this term commonly used in General IT, Problem Solving, Quality Management

Root Certificate

A public key certificate that identifies the Root Certificate Authority (CA).

You will find this term commonly used in Security, Cybersecurity

Root Directory

The first or top-most directory in a hierarchy. It can be likened to the root of a tree â the starting point where all branches originate.

You will find this term commonly used in Operating Systems, File Systems

Root Domain

The highest hierarchical level of a domain name which is under the control of a particular organization or individual.

You will find this term commonly used in Networking, Web Development

Root of Trust

A set of functions in the trusted computing module that is always trusted by the operating system.

You will find this term commonly used in Security, Hardware

Rootkit

Malicious software that provides unauthorized access to a computer system while concealing its presence from users and security tools.

You will find this term commonly used in Cybersecurity

Round Robin

A scheduling algorithm that is most commonly used in networking and operating systems to distribute tasks among resources.

You will find this term commonly used in Networking, Operating Systems

Round Robin Scheduling

A scheduling algorithm in computing that assigns work in equal portions, in order, to each resource, in a circular manner.

You will find this term commonly used in Operating Systems, Scheduling

Round-Trip Time (RTT)

The time it takes for a signal to go from the source to the destination plus the time it takes for an acknowledgment of that signal to be received back at the source.

You will find this term commonly used in Networking, Internet

Route Aggregation

The process of combining several routes into a single advertisement to reduce the size of routing tables.

You will find this term commonly used in Networking, Internet

Route Optimization

The process of determining the most cost-efficient route. It's not just about finding the shortest path between points, but also optimizing for other factors such as cost, time, and resource availability.

You will find this term commonly used in Networking, Logistics

Router

A networking device that forwards data packets between computer networks, typically using IP addresses.

You will find this term commonly used in Networking

Routing Protocol

A protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network.

You will find this term commonly used in Networking

Routing Table

A data table stored in a router or a networked computer that lists the routes to particular network destinations.

You will find this term commonly used in Networking, Internet

Row-Level Security

A feature of many modern databases that allows database administrators to control access to rows in a database table based on the characteristics of the user executing a query.

You will find this term commonly used in Database, Security

What's Your
Career Path?
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass