A protocol that one program can use to request a service from a program located on another computer in a network.
You will find this term commonly used in Networking, Distributed Systems
A public-key cryptosystem that is widely used for secure data transmission.
You will find this term commonly used in Security, Cryptography
A public-key cryptosystem that is widely used for secure data transmission. It's based on the difficulty of factoring the product of two large prime numbers.
You will find this term commonly used in Security, Cryptography
A public-key cryptosystem that is widely used for secure data transmission. Named after its inventors Rivest, Shamir, and Adleman.
You will find this term commonly used in Security, Cryptography
A web feed format used to publish frequently updated content, such as blog posts or news articles, in a standardized format.
You will find this term commonly used in General IT, Web
A method of debugging code by explaining it, line by line, to an inanimate object, like a rubber duck, to understand the problem more clearly.
You will find this term commonly used in Software Development, Debugging
A dynamic, object-oriented programming language known for its simplicity and productivity.
You will find this term commonly used in General IT, Programming
A popular open-source web application framework written in Ruby, known for its simplicity and productivity.
You will find this term commonly used in General IT, Web
A server-side web application framework written in Ruby under the MIT License. It is a model–view–controller (MVC) framework, providing default structures for a database, a web service, and web pages.
You will find this term commonly used in Software Development, Web Development
A package manager for the Ruby programming language that provides a standard format for distributing Ruby programs and libraries.
You will find this term commonly used in Software Development, Web Development
A system that uses rules as the knowledge representation basis to solve problems.
You will find this term commonly used in AI, Expert Systems
The period during which a program is running. It begins when a program is opened (or executed) and ends when the program is closed.
You will find this term commonly used in Software Development, General IT
The process of setting and adjusting options and parameters of software applications during runtime without requiring a restart or redeployment.
You will find this term commonly used in Software Development, Configuration Management
A system for executing computer programs. Often, it is used synonymously with runtime system and runtime library.
You will find this term commonly used in Software Development, General IT
An error that occurs during the execution of a program, as opposed to compilation errors.
You will find this term commonly used in Software Development, Debugging
A collection of software programs used at program runtime to provide one or more native program functions or services.
You will find this term commonly used in Software Development, General IT
Techniques and processes applied during the execution of a program to enhance performance and efficiency dynamically.
You will find this term commonly used in Software Development, Performance
A process in object-oriented programming that allows a function to use variables of different types at runtime.
You will find this term commonly used in Software Development, Programming Concepts
A multi-paradigm programming language designed for performance and safety, especially safe concurrency.
You will find this term commonly used in Software Development
Collections of pre-compiled routines or functions that a program can use to optimize tasks.
You will find this term commonly used in Software Development
A language focused on speed, memory safety, and parallelism, emphasizing safe concurrency and memory management without a garbage collector.
You will find this term commonly used in Software Development
An approach to web design that makes web pages render well on a variety of devices and window or screen sizes.
You will find this term commonly used in Web Development, Design
A software delivery model where software is hosted by a third-party provider and made available to customers over the internet, usually on a subscription basis.
You will find this term commonly used in Cloud Computing, General IT
A set of organization and workflow patterns intended to guide enterprises in scaling lean and agile practices beyond single teams.
You will find this term commonly used in Software Development, Agile Methodologies
A cloud-based software company that provides customer relationship management service and also sells a complementary suite of enterprise applications.
You will find this term commonly used in CRM, Cloud Computing
Demonstrates the ability to configure and manage a Salesforce application.
You will find this term commonly used in CRM Administration
Demonstrates advanced knowledge of Salesforce administration, focusing on higher-level features, customization, and management.
You will find this term commonly used in CRM, Administration
Validates skills in custom development for Salesforce applications, including the ability to develop business logic and interfaces using the Salesforce platform.
You will find this term commonly used in CRM, Software Development
The process of managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization.
You will find this term commonly used in General IT, Software Management
A standard for exchanging authentication and authorization data between parties, particularly between an identity provider and a service provider.
You will find this term commonly used in Security, Cybersecurity
Storage Area Network, a specialized network that provides access to storage resources.
You will find this term commonly used in Storage
A dedicated high-speed network that provides access to shared storage resources, such as disk arrays or tape libraries.
You will find this term commonly used in Storage
An isolated environment where untrusted programs can be executed without affecting the host system, commonly used for testing and security purposes.
You will find this term commonly used in Security, Cybersecurity
Offers training and certifications in cybersecurity and information security, known for in-depth technical courses and GIAC certifications.
You will find this term commonly used in Cybersecurity
An interface used to connect ATA hard drives to a computer's motherboard, supporting faster data transfer speeds than its predecessor, PATA.
You will find this term commonly used in General IT, Hardware
A control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management.
You will find this term commonly used in Networking, Security
The ability of a system, network, or process to handle growing amounts of work or users without sacrificing performance or reliability.
You will find this term commonly used in General IT
A type of testing to ensure a software application can handle the expected number of users, the amount of data, the number of transactions, etc.
You will find this term commonly used in Software Development, Testing
A system or application's ability to handle increasing amounts of work or users without significant performance degradation.
You will find this term commonly used in General IT, Networking
In databases, a schema represents the organizational structure of the database comprising tables, views, and the relationships between them.
You will find this term commonly used in Databases, Data Management
The process of managing changes to a database schema over time, including updates, deletions, and additions to the schema structure.
You will find this term commonly used in Databases, Software Development
A derogatory term for an inexperienced cybercriminal who uses scripts or programs developed by others to attack computer systems and networks.
You will find this term commonly used in Cybersecurity
Writing code to automate tasks or processes.
You will find this term commonly used in General IT
An Agile framework used for managing software development projects, emphasizing iterative development and collaboration.
You will find this term commonly used in Project Management, General IT
A role within a Scrum team responsible for ensuring the team follows agile practices and principles.
You will find this term commonly used in Software Development, Agile Methodologies
A specific application of software-defined networking (SDN) technology applied to WAN connections, which are used to connect enterprise networks over large geographic distances.
You will find this term commonly used in Networking, Software Defined Networking
A data center where all infrastructure is virtualized and delivered as a service, and the control of the data center is automated by software.
You will find this term commonly used in Networking, Cloud Computing
A collection of software development tools in one installable package, designed to facilitate the creation of applications.
You will find this term commonly used in Software Development
The process of planning, designing, developing, testing, deploying, and maintaining software applications.
You will find this term commonly used in Programming, General IT
A security framework that denies access to resources until the identity of the device and the user has been verified.
You will find this term commonly used in Security, Cybersecurity
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.